National Repository of Grey Literature 96 records found  beginprevious41 - 50nextend  jump to record: Search took 0.00 seconds. 
Aspekty bezpečnosti Robot Operating System
KUBOVSKÝ, Petr
This Bc. thesis focuses on the problematics of security of Robot Operating System (ROS). Except short introduction and description of basic ROS principles the main goal of this thesis is to show possible security problems, their analysis and misuse for some possible attacks on system. Some of the attacks will be shown in practical part. Another goal of this thesis is evaluation of overall security of ROS, recommendations how to use ROS safely and how how to effectively protect the system against some of the described attacks.
Machine Learning-enhanced digital Information Operations of the People's Republic of China in the Republic of Korea
Pasligh, Hendrik Arne ; Střítecký, Vít (advisor) ; Kaczmarski, Marcin (referee) ; Schlotti, Jivanta (referee)
MachineLearning-enhanceddigitalInformationOperationsofthePeople's Republic ofChinain the Republic ofKorea Hendrik Arne Pasligh Abstract This study addressesthe research question if, how and to what end the People'sRepublic of China (PRC) might deploy digital information operations enhanced by machine learning (ML) technology in and against the Republic of Korea (ROK). To do so, Ulrich Beck's risk society theory is employed as the theoretical framework, which provides valuable insights into the environment in which information operations are conducted today. This environment is susceptible to information operations on a qualitatively fundamentally different new level. Further, this study establishes a terminology of information operations, bringing clarity to several ill-defined terms that prevail within academic literature. A scenario will be built to visualise a potential PRC information operation against the ROK. The majority of the study seeksto identify and analyse the relevant factors for such a scenario, particularly focusing on PRC strategic interestsandROK vulnerabilities against information operations.This studyfinds that: It is very likely that ML-enhanced artificial agents will increasingly be able to pose as human beings in the digital world; it is very likely that historical issues betweenthe...
MCUXpresso Web application security
Mittaš, Tomáš ; Heriban, Pavel (referee) ; Roupec, Jan (advisor)
This thesis deals with testing of the security of web application MCUXpresso Web SDK Builder using ethical hacking techniques and tools. At the beginning, the history of ethical hacking and structure of web applications are briefly mentioned. The thesis then analyses the application itself from the user’s point of view, its parts before logging in and after logging in and the operation of this application. The following is a list of the most common vulnerabilities and weaknesses found in web applications to understand any vulnerabilities found. Furthemore, the thesis deals with the techniques and tools of web application security and compares them. The penultimate chapter deals with the use of Analysis and vulnerability scanning technique on the application MCUXpresso Web SDK Builder. Finally, an application security test plan is designed, while part of this plan is automated.
Covid19 and the Outbreak Narrative: How the Turkish State Produces and Obscures Gendered and Sexual Vulnerabilities
Cirikciel, Çağla ; Kolářová, Kateřina (advisor) ; Helman, Ivy Ann (referee)
How do the state institutions in Turkey (dis)articulate gender politics? How does the institutional discourse disintegrate gender politics? Where, when, and how do the institutions locate discourse of gender and sexuality into politics of pandemic? Where do institutions become silent? This thesis offers a feminist reading of the pandemic politics and discourse in Turkey; specifically, it analyzes the gendered tensions of the Covid-19 pandemic. Investigating the impacts of the pandemic discourse of the state on gender politics, I aim to unpack the state rhetoric where the official outbreak narrative generates a particular gender narrative. Observing that the state discourse obscures the gendered impacts of the pandemic, I work on locating the pandemic responses and discourses in Turkey. Approaching to politics of discourse as an issue of power and knowledge where power appears through the continuity of knowledge production, I elaborate on how an institutional discourse interprets, incorporates, articulate and disarticulate gender and sexuality overtly and covertly. As unpacking the discursive struggle of the state for mastery in gender and sexuality discourse, I demonstrate how the state reshapes and redirects the narratives on gender and sexuality within the politics of outbreak. Keywords:...
"Neither young, nor old" - A Case Study of Active Ageing in a Cultural and Educational Senior Center in Prague
Nováková, Pavla ; Ezzeddine, Petra (advisor) ; Synek, Michal (referee)
In my thesis, I deal with active ageing as a concept that is reflected in social policies. Active ageing presents activity as a key to satisfaction in older age and directs ageing population towards bigger independence and care about their health. I conducted my research in a chosen cultural and educational senior center in Prague. My main interest was how active ageing as an idea was transformed into social practice and how the activity was emphasized in the senior center and amongst its clients. The success of active ageing relates to culturally specific values as independence, activity, health, and self-realization (Lamb, 2020). Activity became a base for the hierarchization of activities, as well as people. The senior center which deals with the idea of active ageing is a safe space for its clients where activity represents a new social capital. However, this social capital has its limits as the COVID-19 pandemic has revealed. Keywords: active ageing, activity, social capital, vulnerability, senior center, neoliberalism
Implementation Of Application That Demonstrates Mobile Application Vulnerabilities
Šrůtková, Karolína
Nowadays, using mobile applications is a daily routine for all of us. This trend is misusedby hackers who attack all kinds of mobile apps from which they can get not only sensitive dataof users. The main contribution of this paper is a design and implementation of a mobile applicationthat demonstrates mobile application vulnerabilities of Android mobile operating system andthat could help developers to build more secure applications.
Black-Box Analysis of Wi-Fi Stacks Security
Venger, Adam ; Orsák, Michal (referee) ; Malinka, Kamil (advisor)
Zariadenia, na ktoré sa každodenne spoliehame, sú stále zložitejšie a využívajú zložitejšie protokoly. Jedným z týchto protokolov je Wi-Fi. S rastúcou zložitosťou sa zvyšuje aj potenciál pre implementačné chyby. Táto práca skúma Wi-Fi protokol a použitie fuzz testingu pre generovanie semi-validných vstupov, ktoré by mohli odhaliť zraniteľné miesta v zariadeniach. Špeciálna pozornosť bola venovaná testovaniu Wi-Fi v systéme ESP32 a ESP32-S2. Výsledkom práce je fuzzer vhodný pre testovanie akéhokoľvek Wi-Fi zariadenia, monitorovací nástroj špeciálne pre ESP32 a sada testovacích programov pre ESP32. Nástroj neodhalil žiadne potenciálne zraniteľnosti.
Development of a calculator for assessing vulnerabilities in Javascript
Škrhák, Pavel ; Fujdiak, Radek (referee) ; Holasová, Eva (advisor)
The aim of this work is to describe the known methods of vulnerability assessment, and to implement them in a web application using the Vue.js framework. The thesis describes two vulnerability assessment systems, namely CVSS (Common Vulnerability Scoring System) and OWASP (Open Web Application Security Project) Risk Rating Methodology. Their parts, metrics and methods of calculation of the evaluation are described. Subsequently, these systems are compared and their strengths and weaknesses are determined. The work then evaluates some known vulnerabilities using these two assessment methods. The work then describes the design of the frontend and backend of the web application. The frontend uses the Vue.js framework, which allows the creation of dynamic one-page web applications. The components and layout of the application are designed. Furthermore, the appearance of the front application and its components is designed. The backend was designed to suit with the Djnago framework, which together with the django REST framework can be used to quickly create an API (Application Programming Interface) communicating with the database. A model for storing data from a frontend application was designed. The work then describes the implementation of this application divided into frontend and backend. The backend describes the implementation of the API and the database. The implementation of the model itself, serializer and methods for communication with the frontend application are described. In the frontend, a vue router is created, which is used to dynamically change the content of the page, then the components themselves are created, which serve as building blocks of the application. These components contain three parts, namely structure, JavaScript code and CSS (Cascading Sytle Sheets). Components can pass data and call functions of other components. The last part of the work is testing of the application itself. Its functionality is tested by calculating the score of already assessed vulnerabilities and some items of the OWASP ASVS (Application Security Verification Standard). Furthermore, security is tested by testing several known vulnerabilities, along with testing with OWASP ASVS.
Implementation of a vulnerability assessment calculator
Ludes, Adam ; Švikruha, Patrik (referee) ; Martinásek, Zdeněk (advisor)
This bachelor thesis focuses on a newly introduced vulnerability scoring system, compares it to a most widespread alternative, which is Common Vulnerability Scoring System (CVSS), analyzes the Vue.js framework and other technologies used in the implementation. Lastly it introduces an implementation of said new scoring system in a way to best showcase its capabilities.
Implementation of application that demonstrates mobile application vulnerabilities
Šrůtková, Karolína ; Šilhavý, Pavel (referee) ; Martinásek, Zdeněk (advisor)
This master thesis is focused on an implementation of application for Android operating system that demonstrates mobile application vulnerabilities. Theoretical part contains security of mobile applications and its current state including a description of the biggest security risks and vulnerabilities. In addition, general development of mobile applications for Android is mentioned. In a practical part of the thesis a custom design of the application is described including vulnerabilities analysis, design of basic application blocks and selection of suitable tools for implementation. The section describing the implementation of the application describes the preparation of the environment, the structure of the created application and especially its implementation. The last part contains an example of implemented application vulnerabilities and also the result of its testing.

National Repository of Grey Literature : 96 records found   beginprevious41 - 50nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.